The software reads from a buffer using buffer access
mechanisms such as indexes or pointers that reference memory locations prior to
the targeted buffer.
Wrap around errors occur whenever a value is incremented past
the maximum value for its type and therefore "wraps around" to a very small,
negative, or undefined value.
The product uses untrusted input when calculating or using an
array index, but the product does not validate or incorrectly validates the
index to ensure the index references a valid position within the array.
Storing a plaintext password in a configuration file allows
anyone who can read the file access to the password-protected resource making
them an easy target for attackers.
The software parses a formatted message or structure, but it
does not handle or incorrectly handles a length field that is inconsistent with
the actual length of the associated data.